malware page 1

phishing campaigns financial industry threat advisory finance institution

Organized phishing campaigns eye finance industry

Cyber-security experts have just discovered a new modular downloader that has the capability to download other modules and payloads. It’s embedded itself in large phishing campaigns and primarily hitting major financial institutions, planting their seeds for possible future attacks. Named Marap by security researchers, after its command and control (C&C) phone home parameter “param” spelled...
Continue Reading
wordpress website joomla malcious scripts malware hacking hacker

New Malicious Script poses threat to WordPress and Joomla-based websites

Cyber-security researchers are warning owners of Joomla and WordPress websites of a malicious redirect script that is pushing visitors to malicious websites and expose them to various malwares. A renowned cyber-security researcher published a report outlining a rogue hypertext access (.htaccess) injector found on a client website. He reported that the impacted site was directing...
Continue Reading
black router iranian malware ransomware trojan blackrouter

Iranian Malware BlackRouter – evolved as a Ransomware

BlackRouter, a ransomware recognized in 2018 is currently being endorsed as a Raas by its maker. The individual behind BlackRouter, known as “MOH3NE2”, is accepted to be of Iranian origins. This ransomware was identified by a cybersecurity scientist Petrovic and is found to have enhanced highlights, for example, a clock and an alternate GUI over...
Continue Reading
socialmedia impersonation phishing

Social Media Impersonation – Threat to Privacy

The overall number of social media impersonation increased 11-fold from December 2016 to December 2018, with the bad actors bent on collecting credentials and PII. Impersonators are most commonly found on Facebook, Twitter, Google+, though impersonators were also found on Instagram, YouTube and LinkedIn. Nearly half of all nefarious social media impersonators disguise their payload...
Continue Reading
antimalware malware cryptocurrency

Rabbit Malware Found Attacking Linux Servers and IoT

Cyber security researchers have just discovered a new malware, called “Linux Rabbit,” that targeted Linux servers and Internet-of-Things (IoT) devices in a campaign that began in August 2018 and continued until October 2018. The campaign targeted devices in Russia, South Korea, the UK, and the US. The campaign utilizes two strains of malware that share...
Continue Reading
Info-stealing malware targeting android phone users | Malware Trojan

Info-stealing malware exploits bouncing golf campaign targeting android phone users

Security Researchers recently discovered a new malware trojan called GolfSpythat targets android phone users in the Middle East and was designed to steal personal information and potentially take control over mobile devices.The malware’s cyberespionage campaign was named “Bouncing Golf”based on the malware’s code in the package named “golf.”This info-stealing malware is known for its wide...
Continue Reading
Malware and Adware Attacks Using WP Plugins

Malware and Adware Attacks Using WP Plugins

With each passing day, cases of WordPress infection that redirects visitors to suspicious pages is getting common.  Recently, a vulnerability was discovered in tag Div Themes and Ultimate Member Plugins. In this WordPress redirect hack visitors to your website are redirected to phishing or malicious pages.   In this hack, users, when redirected, are taken...
Continue Reading

Infamous TA505 Hackers Attacked US Companies – Again

Cybercriminals behind the notorious Dridex and Locky ransomware have a new target in their sights – large retail, restaurant and grocery chains located in the US.   Researchers are warning the well-known financial criminal group TA505 is behind a new wave of email campaigns distributing personalized malware-laced attachments, a technique not previously associated with the...
Continue Reading

More than 1Million RDP Servers Attacked by BotNet-Wielding Hackers

Hackers have deployed a botnet that’s actively targeting systems running a remote desktop protocol (RDP) connection using a hard-to-detect brute-forcing mechanism.   A security researcher has discovered that more than 1.5 million RDP endpoints have so far been compromised by a botnet dubbed GoldBrute and that this figure is only expected to rise.   It...
Continue Reading

MimiKatz Ransomware – Specially designed for Hacking

In this day and age, digital aggressors are consistently gaining ground in their hacking apparatuses and systems so as to accomplish a greater vindictive plan. Be that as it may, this does not mean they are for saking the essential instruments, methods, and systems when leading a digital assault.   Indeed, a large portion of...
Continue Reading
1 2 3 5